Abstract: The present disclosure includes IoT devices, block chain platforms, and IoT systems for recording transportation data of an object and methods of using the same. In some examples, IoT devices are one time programmed with a private key in a manufacturing process of the IoT device. In some examples, IoT devices may include at least one sensor configured to detect external environment data of an object during transportation of the object; and a processor configured to receive the data from the sensor and generate a data packet based on the data using a private key, the data packet including a unique identification number of the IoT device, the data and a signature generated according to the unique identification number and the data.
Abstract: A method is disclosed for implementing trust Internet of Things (IoT) services in an IoT device and a user device. The IoT device receives from the user device an authentication request comprising a hash value, first encrypted information and second encrypted information, where the IoT device determines whether the user device is successfully authenticated based on determining the user device public key and confirming that the user device public key exists in a list of access permitted user devices of the IoT device.
Abstract: The present disclosure includes IoT devices, block chain platforms, and IoT systems for recording transportation data of an object and methods of using the same. In some examples, IoT devices are one time programmed with a private key in a manufacturing process of the IoT device. In some examples, IoT devices may include at least one sensor configured to detect external environment data of an object during transportation of the object; and a processor configured to receive the data from the sensor and generate a data packet based on the data using a private key, the data packet including a unique identification number of the IoT device, the data and a signature generated according to the unique identification number and the data.